Game of Registrars: an Empirical Analysis of Post-Expiration Domain

Total Page:16

File Type:pdf, Size:1020Kb

Game of Registrars: an Empirical Analysis of Post-Expiration Domain Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers Tobias Lauinger, Northeastern University; Abdelberi Chaabane, Nokia Bell Labs; Ahmet Salih Buyukkayhan, Northeastern University; Kaan Onarlioglu, www.onarlioglu.com; William Robertson, Northeastern University https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/lauinger This paper is included in the Proceedings of the 26th USENIX Security Symposium August 16–18, 2017 • Vancouver, BC, Canada ISBN 978-1-931971-40-9 Open access to the Proceedings of the 26th USENIX Security Symposium is sponsored by USENIX Game of Registrars: An Empirical Analysis of Post-Expiration Domain Name Takeovers Tobias Lauinger Abdelberi Chaabane Ahmet Salih Buyukkayhan Northeastern University Nokia Bell Labs Northeastern University Kaan Onarlioglu William Robertson www.onarlioglu.com Northeastern University Abstract zones of authority or trust. For example, controlling a domain name is often equivalent to gaining access to Every day, hundreds of thousands of Internet domain additional resources [44]. An assumption common to all names are abandoned by their owners and become avail- these approaches is that domain ownership is constant and able for re-registration. Yet, there appears to be enough perpetual. However, in actuality this is not true as domain residual value and demand from domain speculators to name registrations must be renewed and paid for on a give rise to a highly competitive ecosystem of drop-catch yearly basis. In fact, hundreds of thousands of expired services that race to be the first to re-register potentially domain names are deleted each day (e.g., over 75 k per desirable domain names in the very instant the old re- day in the popular com zone alone [24]). gistration is deleted. To pre-empt the competitive (and uncertain) race to re-registration, some registrars sell their Once a domain name has been deleted, it can be re- own customers’ expired domains pre-release, that is, even registered by any interested party on a first-come, first- before the names are returned to general availability. served basis. Schlamp et al. [44] showed how such re- These practices are not without controversy, and can registrations can be used to take over protected resources have serious security consequences. In this paper, we associated with these domains. Nikiforakis et al. [42] present an empirical analysis of these two kinds of post- discussed websites still attempting to include JavaScript expiration domain ownership changes.We find that 10 % code from third-party domains long after they had expired, allowing attackers to inject code into these sites. Lever et of all com domains are re-registered on the same day as al. [33] measured more formally how often re-registered their old registration is deleted. In the case of org, over 50 % of re-registrations on the deletion day occur during domains were associated with malicious behaviour. How- only 30 s. Furthermore, drop-catch services control over ever, by focussing on certain kinds of risk or malice, these 75 % of accredited domain registrars and cause more than studies do not illustrate the full scope of the issue. 80 % of domain creation attempts, but represent at most We argue that the problem goes beyond specific cases 9.5 % of successful domain creations. These findings of abuse related to re-registered domains. It also in- highlight a significant demand for expired domains, and cludes the much broader and more frequent category of hint at highly competitive re-registrations. undesirable behaviour akin to topics thoroughly studied Our work sheds light on various questionable practices by the security community, such as spam [32], search in an opaque ecosystem. The implications go beyond the engine poisoning [49], ISPs hijacking NXDOMAIN annoyance of websites turned into “Internet graffiti” [26], DNS responses [50], domain parking [2, 48], typo- as domain ownership changes have the potential to cir- squatting [1, 37, 47], and reuse of social media profile cumvent established security mechanisms. names [35, 36]. Re-registered domains appear to be pre- dominantly used for speculation and monetisation pur- poses, taking advantage of the residual traffic still reach- 1 Introduction ing the domains. Users who follow links from third-party websites or type in an address that they remember are Domain names are a key part of linking to content on taken to a new incarnation of the site that can be arbitrarily the Web, and they have an equally central role in naming different from the service that they actually wish to visit. services on the Internet, such as in email addresses. A In Section 4.4, we show that a majority of re-registered large number of security mechanisms and protocols have domains are parked and host nothing but advertisements. been devised that rely on domains to designate distinct ICANN called this undesirable practice “a form of Inter- USENIX Association 26th USENIX Security Symposium 865 net graffiti” [26]; domain parking is also known to pose their own systems in an “optimal strategical location” [4] higher-than-average risks to visitors [48]. physically close to the registry; these optimisations re- We believe it is important for the security community semble high-frequency trading in the financial industry. to better understand the big picture of domain ownership Drop-catch services are not without controversy. Some transfers and the implications for users, Internet abuse, registries actively discourage the practice (e.g., registrars and defences thereof. This paper provides a quantitative are penalised for failed uk registration requests [8]), while analysis of the “recycling” of expired domain names. We others at least implicitly encourage or facilitate it (e.g., show that this is a frequent phenomenon, causing a range Verisign makes available to its registrars lists of com and of negative side effects as companies compete with each net domains that are about to be deleted). other while catering to the demand for expired domains. The extent and process of the drop are publicly known There are four distinct scenarios in which domains only in abstract terms as each drop-catch service aims to can change owners: When the current owner sells to a maintain their competitive position. In this paper, we con- new owner while the domain registration is active; when duct the first measurement study of the drop and provide the domain’s sponsoring registrar sells the domain to a as much detail as is possible from an outside vantage new owner while the domain registration is expired but point. Furthermore, we characterise the extent and com- before control of the domain is returned to the registry petitiveness of drop-catch re-registrations on “day 0,” that (pre-release); as an instant re-registration in the very mo- is, the day an expired domain name is deleted. ment the old registration is deleted, using a drop-catch We find that a surprisingly large fraction of deleted do- service; or as a conventional domain registration at any mains (10 % of com) is re-registered on the same day. In later time using any domain name registrar. Regular do- the case of org, the drop lasts only about 30 seconds, main sales are authorised by the owner of the domain but accounts for more than half of all same-day re- and therefore less of a concern from an abuse perspective. registrations of deleted domains. These results show that Medium to long-term domain re-registrations have been re-registrations are frequent and highly competitive. Des- studied before [29, 22]. Pre-release and drop-catch do- pite the significantly higher price, there is a large demand main ownership transfers, however, are barely mentioned for drop-catch domains. In fact, there seems to be an in the literature, and we are not aware of any systematic arms race between drop-catch services that has been in- measurement or quantification of these phenomena. tensifying recently, with the Top 3 now controlling 75 % There is an entire ecosystem of services attempting of accredited registrars. Drop-catch causes at least 80 % to monetise and profit from expired domains. Many do- of domain creation attempts, yet only a tiny fraction are main registrars such as GoDaddy auction off their own eventually successful. The higher prices paid for drop- customers’ expired domains (without their collaboration); catch domains suggest that their new owners consider when sold, these domains maintain their current registra- them to be valuable; however, in our cursory analysis of tion and are simply made over to the new owner. From a domain uses, we show that most re-registered drop-catch security perspective, such pre-release domains are prob- domains contain nothing but advertisements and parking lematic because they retain their original creation dates pages, suggesting monetisation through residual traffic and exhibit only very limited cues as to the new owner- and speculative re-registrations. Our findings raise the ship. For instance, pre-release domains subvert proactive question of whether these uses justify the risks associated creation-time domain blacklisting mechanisms such as with domain ownership changes without the explicit con- Predator [21], which is related to a similar technique used sent of the prior registrant; they furthermore illustrate that by the commercial Spamhaus blacklist, because the own- security mechanisms must account for domain deletions ership change does not involve a new registration. This and re-registrations as a frequent phenomenon (e.g., more example illustrates the need for a thorough study of how than 20 % of all com domains are deleted each year, and commonly pre-release domains are available and sold. out of those, 10 % are re-registered immediately by a new Once expired domains are deleted, they can be re- owner, and many more at a later time). registered on a first-come, first-served basis, and these Our work makes the following contributions: re-registrations can be quite competitive.
Recommended publications
  • Privacy Policy V1.1
    CENTRALNIC LTD REGISTRY PRIVACY POLICY Version 1.1 September 2018 CentralNic Ltd 35-39 Moorgate London EC2R 6AR Table of Contents TABLE OF CONTENTS ......................................................................................................................... 2 AMENDMENT ISSUE SHEET ................................................................................................................. 3 INTRODUCTION ................................................................................................................................ 4 DATA PROTECTION RIGHTS ................................................................................................................. 5 RELATIONSHIP WITH REGISTRARS ......................................................................................................... 6 WHAT INFORMATION CENTRALNIC COLLECTS .......................................................................................... 6 INFORMATION CENTRALNIC DOES NOT COLLECT ....................................................................................... 8 HOW INFORMATION IS STORED ............................................................................................................ 8 HOW WE USE INFORMATION ............................................................................................................... 8 HOW INFORMATION IS PROTECTED ..................................................................................................... 13 HOW INFORMATION IS DELETED ........................................................................................................
    [Show full text]
  • Passive Monitoring of DNS Anomalies Bojan Zdrnja1, Nevil Brownlee1, and Duane Wessels2
    Passive Monitoring of DNS Anomalies Bojan Zdrnja1, Nevil Brownlee1, and Duane Wessels2 1 University of Auckland, New Zealand, b.zdrnja,nevil @auckland.ac.nz { } 2 The Measurement Factory, Inc., [email protected] Abstract. We collected DNS responses at the University of Auckland Internet gateway in an SQL database, and analyzed them to detect un- usual behaviour. Our DNS response data have included typo squatter domains, fast flux domains and domains being (ab)used by spammers. We observe that current attempts to reduce spam have greatly increased the number of A records being resolved. We also observe that the data locality of DNS requests diminishes because of domains advertised in spam. 1 Introduction The Domain Name System (DNS) service is critical for the normal functioning of almost all Internet services. Although the Internet Protocol (IP) does not need DNS for operation, users need to distinguish machines by their names so the DNS protocol is needed to resolve names to IP addresses (and vice versa). The main requirements on the DNS are scalability and availability. The DNS name space is divided into multiple zones, which are a “variable depth tree” [1]. This way, a particular DNS server is authoritative only for its (own) zone, and each organization is given a specific zone in the DNS hierarchy. A complete domain name for a node is called a Fully Qualified Domain Name (FQDN). An FQDN defines a complete path for a domain name starting on the leaf (the host name) all the way to the root of the tree. Each node in the tree has its label that defines the zone.
    [Show full text]
  • Monthly Cybersecurity Newsletter April 2018 Issue
    Monthly Cybersecurity Newsletter April 2018 Issue Enterprise Security and Risk Management Office (ESRMO) From the Desk of the State Chief Risk Officer – Maria Thompson Be Careful What You Type You should be careful when typing a web address into your browser. It is very easy to enter a similar but incorrect domain name and end up somewhere you do not want to be. Unscrupulous individuals use domain names similar to more popular ones on the Internet in order to entice individuals who mistakenly type the wrong web address. This practice of using similar domain names and relying on individuals to type the wrong address is called typosquatting. A typosquatter’s URL will usually be one of several kinds: a common misspelling of the known name (e.g. exemple.com), a differently phrased name (e.g. examples.com), a different top-level domain name (e.g. example.org), or an abuse of a country code (example.cm). In fact, a report published in December 2009 by McAfee found that .cm was the riskiest domain in the world, with 36.7% of the sites posing a security risk to users. Once on a typosquatter’s site, the user may be tricked into thinking he or she is on the intended site, through the use of similar logos, website layouts or content. Visiting such a site, however, may result in malicious software (malware) to be downloaded and installed on the end user’s machine, or it may entice the end user to disclose private information. Most typosquatters are probably just aiming to make money by taking advantage of your errors.
    [Show full text]
  • Web Portal User Manual For
    Web Portal User Manual for ©Copyright 2009 Afilias Limited Afilias Managed DNS – Web Portal User Manual Contents 1. Introduction ................................................................................................................ 1 1.1 About Afilias Managed DNS Service ........................................................................ 1 1.2 Afilias Managed DNS Service Website Help ............................................................. 1 1.3 Support .................................................................................................................. 2 2. DNS Portal Login Screen ............................................................................................... 4 3. MyAccount Screen ....................................................................................................... 5 3.1 Users & Groups ...................................................................................................... 5 3.1.1 User Details Tab ...................................................................................................... 6 3.1.2 User Password Tab .................................................................................................. 7 3.1.3 Users Tab ................................................................................................................. 8 3.1.4 Groups Tab .............................................................................................................. 9 3.2 Add User ...............................................................................................................
    [Show full text]
  • Proactive Cyberfraud Detection Through Infrastructure Analysis
    PROACTIVE CYBERFRAUD DETECTION THROUGH INFRASTRUCTURE ANALYSIS Andrew J. Kalafut Submitted to the faculty of the Graduate School in partial fulfillment of the requirements for the degree Doctor of Philosophy in Computer Science Indiana University July 2010 Accepted by the Graduate Faculty, Indiana University, in partial fulfillment of the requirements of the degree of Doctor of Philosophy. Doctoral Minaxi Gupta, Ph.D. Committee (Principal Advisor) Steven Myers, Ph.D. Randall Bramley, Ph.D. July 19, 2010 Raquel Hill, Ph.D. ii Copyright c 2010 Andrew J. Kalafut ALL RIGHTS RESERVED iii To my family iv Acknowledgements I would first like to thank my advisor, Minaxi Gupta. Minaxi’s feedback on my research and writing have invariably resulted in improvements. Minaxi has always been supportive, encouraged me to do the best I possibly could, and has provided me many valuable opportunities to gain experience in areas of academic life beyond simply doing research. I would also like to thank the rest of my committee members, Raquel Hill, Steve Myers, and Randall Bramley, for their comments and advice on my research and writing, especially during my dissertation proposal. Much of the work in this dissertation could not have been done without the help of Rob Henderson and the rest of the systems staff. Rob has provided valuable data, and assisted in several other ways which have ensured my experiments have run as smoothly as possible. Several members of the departmental staff have been very helpful in many ways. Specifically, I would like to thank Debbie Canada, Sherry Kay, Ann Oxby, and Lucy Battersby.
    [Show full text]
  • ICANN Registry Request Service
    ICANN Registry Request Service Ticket ID: X8T8C-0S4B2 Registry Name: Public Interest Registry gTLD: .org Status: ICANN Review Status Date: 2013-06-04 22:05:48 Print Date: 2013-06-04 22:06:10 Proposed Service Name of Proposed Service: Technical description of Proposed Service: Technical Description of Proposed Service: Background: BTAPPA will be beneficial in situations where one ICANN-accredited registrar purchases (the "Gaining Registrar"), by means of a stock or asset purchase, merger or similar transaction, a portion, but not all, of another ICANN accredited registrar's domain name portfolio ("Losing Registrar") in the .ORG top-level domains ("TLDs") or where a Gaining Registrar receives a request from a registrant to transfer a significant number of its domain names from a Losing Registrar to such Gaining Registrar. Unless an entire portfolio of domain names is being transferred, Gaining Registrars must request that each domain name be transferred individually. Gaining Registrars must meet the following requirements: oGaining Registrar must be ICANN accredited for the .ORG TLD. oGaining Registrar must be in good standing and be under a Registry-Registrar Agreement with PIR. oGaining Registrar must provide PIR with evidence (i.e., affidavit, sale documents) that sets forth the transfer date or, if an acquisition, the target closing date. oIf domain names are to be transferred from multiple Losing Registrars, then they must be Registrar Affiliates. A Registrar Affiliate is a registrar entity that controls, is controlled by or is under common control with, another the Losing Registrar. oTransfers of domain names to multiple Gaining Registrars will not be permitted, regardless of familiar relationship.
    [Show full text]
  • | Icann Whois 10/19/18, 126 Pm
    | ICANN WHOIS 10/19/18, 126 PM Portuguese اﻟﻌرﺑﯾﺔ ᓌ֛Ӿ෈ English Français Русский Español ICANN WHOISABOUT GET WHOIS WHOIS POLICIES INVOLVED COMPLAINTS KNOWLEDGE CENTER geneticliteracyproject.org Lookup By submitting any personal data, I agree that any the personal data will be processed in accordance with the ICANN Privacy Policy, and agree to abide by the website Terms of Service. Showing results for: GENETICLITERACYPROJECT.ORG Original Query: geneticliteracyproject.org Submit a Complaint for WHOIS WHOIS Inaccuracy Contact Information Complaint Form WHOIS Service Complaint Form Registrant Admin Contact Tech Contact WHOIS Compliance Contact Name: Name: Organization: Organization: FAQs Name: Mailing Address: , Mailing Address: , Organization: ESG Phone: Phone: MediaMetrics Mailing Address: , Ext: Ext: Ohio US Fax: Fax: Phone: Fax Ext: Fax Ext: Ext: Email: Email: Fax: Fax Ext: Email: https://whois.icann.org/en/lookup?name=geneticliteracyproject.org Page 1 of 4 | ICANN WHOIS 10/19/18, 126 PM Registrar Status WHOIS Server: Domain whois.godaddy.com Status:clientDeleteProhibited URL: https://icann.org/epp#clientDel http://www.whois.godaddy.com eteProhibited Registrar: GoDaddy.com, LLC Domain IANA ID: 146 Status:clientRenewProhibited https://icann.org/epp#clientRen Abuse Contact Email: ewProhibited [email protected] Domain Abuse Contact Phone: Status:clientTransferProhibited +1.4806242505 https://icann.org/epp#clientTran sferProhibited Domain Status:clientUpdateProhibited https://icann.org/epp#clientUpd ateProhibited Important Dates Name Servers
    [Show full text]
  • I Wish to Thank the United States Department of Commerce's
    Comments from Danny Younger Introduction: I wish to thank the United States Department of Commerce’s National Telecommunications and Information Administration for this opportunity to comment on the continuation of the transition of the technical coordination and management of the Internet’s domain name and addressing system to the private sector. As a member of the public that has had the honor of serving as an elected Chair of the General Assembly of the Domain Name Supporting Organization of the Internet Corporation for Assigned Names and Numbers, I sincerely appreciate your posting of a Notice of Inquiry and wish to share with you my thoughts on the transition process as an individual that has tracked ICANN-related matters on a regular basis for the last six years. It has been said that “ICANN may not be the world’s most unpopular organization, but if it had consciously set out to make itself loathed it could hardly have been more successful.”1 I share that assessment. ICANN, the organization selected to embody the principles set forth in the White Paper2 is almost universally reviled. From my vantage point as a long-time ICANN participant, I have come to conclude that this passionate loathing has a single root cause: we detest ICANN because it has not remained true to the White Paper’s noble vision – rather than striving to become an organization committed to private, bottom-up coordination operating for the benefit of the Internet community as a whole, ICANN has chosen instead to focus its attention exclusively upon that select stakeholder community that feeds its coffers – it has become primarily a registry-registrar Guild Manager.
    [Show full text]
  • Godaddy Account Change Instructions
    Godaddy Account Change Instructions Bubbling and perfectionist Waylen lath while pectinate Archibold wrought her snigger famously and palisading beyond. Bellying Eddy summers: he plucks his ballup resolutely and apomictically. Teensy Harvie still convinced: sludgier and subvertical Richmond rejuvenises quite forebodingly but overspecializing her skin-pops pensively. You a godaddy account and website for emails get to follow these articles can add a new change of stock text with Please enter the instructions on your customers book appointments and individual orders and closed for godaddy account change instructions. You can step the following morning for instructions on how to flight your. Does it is where we buy your last name? This lets you groove your emails to another email account. Luckily it's adultery to use Gmail with your own domain name free That way warrant can have my best outcome both worlds a record domain email with the convenience of Gmail's interface You also don't have these log food to different platforms to enjoy your personal and business emails. This includes confirmation emails instructions to unsubscribe and middle text you the email. How property Transfer phone to Another GoDaddy Account with. Not change of account changes have instructions. GoDaddy How we retrieve EPP Domain Transfer QTHcom. The Easy surveillance to accompany up Gmail with a rich Domain of Free. This those not position your ability to nature the forwarding again in building future you. The shoulder will already be challenging if you should our step-by-step instructions. That matches your domain purchased the instruction without a great read through gmail, tap on your specific interface.
    [Show full text]
  • Outcomes Report of the GNSO Ad Hoc Group on Domain Tasting
    GNSO Outcomes Report on Domain Tasting Doc. No.: Date: 2007/02/04 4 October, 2007 OUTCOMES REPORT OF THE GNSO AD HOC GROUP ON DOMAIN NAME TASTING 4 October 2007 Group Chair: Mike Rodenbaugh ICANN Staff: Olof Nordling, Patrick Jones STATUS OF THIS DOCUMENT This is the final version of the Outcomes Report from the GNSO ad hoc group on Domain Name Tasting, submitted to the GNSO Council on 4 October, 2007. GNSO Outcomes Report on Domain Tasting v1.6 Authors: Mike Rodenbaugh, [email protected] , Olof Nordling, [email protected] , Patrick Jones, [email protected], Page 1 of 144 GNSO Outcomes Report on Domain Tasting Doc. No.: Date: 2007/02/04 4 October, 2007 TABLE OF CONTENTS 1 EXECUTIVE SUMMARY 3 2 OBJECTIVE 5 3 BACKGROUND 7 4 OUTCOMES 10 5 NEXT STEPS 32 ANNEX 1 - SUBSCRIBERS TO THE DT LIST 33 ANNEX 2 - RFI RESPONSES 34 ANNEX 3 - EXPERIENCES FROM CCTLDS 97 ANNEX 4 - COMMENTS FROM UDRP PROVIDERS 104 ANNEX 5 – IPC CONSTITUENCY SUPPLEMENTAL RFI116 ANNEX 6 – REQUEST TO VERISIGN 144 GNSO Outcomes Report on Domain Tasting v1.6 Authors: Mike Rodenbaugh, [email protected] , Olof Nordling, [email protected] , Patrick Jones, [email protected], Page 2 of 144 GNSO Outcomes Report on Domain Tasting Doc. No.: Date: 2007/02/04 4 October, 2007 1 Executive summary 1.1 Background Following a request from the At-Large Advisory Committee in spring 2007, the GNSO Council called for an Issues Report on Domain Tasting from ICANN Staff in May 2007. This Issues Report, available at http://gnso.icann.org/issues/domain- tasting/gnso-domain-tasting-report-14jun07.pdf was discussed at the ICANN San Juan meeting, where the GNSO Council on 27 June 2007 (minutes at http://gnso.icann.org/meetings/minutes-gnso-27jun07.shtml) resolved to establish an ad hoc group for further fact-finding on the practice of domain tasting.
    [Show full text]
  • Brief of Internet Commerce Association
    No. 19-46 IN THE Supreme Court of the United States U.S. PATENT AND TRADEMARK OFFICE, ET AL., Petitioners, v. BOOKING.COM B.V., Respondent. ON WRIT OF CERTIORARI TO THE UNITED STATES COURT OF APPEALS FOR THE FOURTH CIRCUIT BRIEF OF THE INTERNET COMMERCE ASSOCIATION AS AMICUS CURIAE IN SUPPORT OF RESPONDENT Megan L. Brown Counsel of Record David E. Weslow Ari S. Meltzer Jeremy J. Broggi WILEY REIN LLP 1776 K Street NW Washington, DC 20006 (202) 719-7000 [email protected] February 19, 2020 Counsel for Amicus Curiae - i - TABLE OF CONTENTS Page TABLE OF CITED AUTHORITIES .......................... ii INTEREST OF AMICUS CURIAE ............................1 SUMMARY OF ARGUMENT .....................................3 ARGUMENT ...............................................................7 I. The Government Seeks A Bright-Line Rule That Would Devalue Registered Domain Names As A Class Of Intellectual Property Assets. ...............................................................7 II. The Government’s Rule Would Discourage Investment In The Internet Economy By Precluding Trademark Protection For New Types of Domain Names. ............................... 13 III. The Government’s Rule Would Eliminate A Critical Consumer Protection And Anti-Fraud Tool, Opening The Door To More Domain Name Abuse. ................................................... 15 A. Cybercriminals Abuse Domain Names Through Typosquatting And Domain Name Hijacking To Perpetrate Fraud And Proliferate Malware. .................... 16 B. Companies Rely On Trademark Protection To Combat Domain Name Abuse. ................................................... 20 C. Non-Trademark Remedies Do Not Provide A Sufficient Means For Combatting Domain Name Abuse. ..... 26 CONCLUSION .......................................................... 28 - ii - TABLE OF CITED AUTHORITIES Page(s) Cases Central Source LLC v. annaulcreditreports.com, No. 20-CV-84 (E.D. Va.) ....................................... 23 Central Source LLC v. aabbualcreditreport.com, No. 14-CV-918 (E.D.
    [Show full text]
  • The Secondary Market for Domain Names”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (2006-04-12), “The Secondary Market for Domain Names”, OECD Digital Economy Papers, No. 111, OECD Publishing, Paris. http://dx.doi.org/10.1787/231550251200 OECD Digital Economy Papers No. 111 The Secondary Market for Domain Names OECD Unclassified DSTI/ICCP/TISP(2005)9/FINAL Organisation de Coopération et de Développement Economiques Organisation for Economic Co-operation and Development 12-Apr-2006 ___________________________________________________________________________________________ _____________ English - Or. English DIRECTORATE FOR SCIENCE, TECHNOLOGY AND INDUSTRY COMMITTEE FOR INFORMATION, COMPUTER AND COMMUNICATIONS POLICY Unclassified DSTI/ICCP/TISP(2005)9/FINAL Working Party on Telecommunication and Information Services Policies THE SECONDARY MARKET FOR DOMAIN NAMES English - Or. English JT03207431 Document complet disponible sur OLIS dans son format d'origine Complete document available on OLIS in its original format DSTI/ICCP(2005)9/FINAL FOREWORD This report was presented to the Working Party on Telecommunications and Information Services Policies (TISP) in December 2005 and was declassified by the Committee for Information, Computer and Communications Policies (ICCP) in March 2006. This report was prepared by Ms. Karine Perset, with the participation of Mr. Dimitri Ypsilanti, both of the OECD's Directorate for Science, Technology and Industry. This report is published on the responsibility of the Secretary-General of the OECD. 2 DSTI/ICCP(2005)9/FINAL © OECD/OCDE 2006 3 DSTI/ICCP(2005)9/FINAL
    [Show full text]